Home » Computer Network Attack and the Laws of Armed Conflict: Searching for Moral Beacons in Twenty-First-Century Cyberwarfare by Matthew E. Haber
Computer Network Attack and the Laws of Armed Conflict: Searching for Moral Beacons in Twenty-First-Century Cyberwarfare Matthew E. Haber

Computer Network Attack and the Laws of Armed Conflict: Searching for Moral Beacons in Twenty-First-Century Cyberwarfare

Matthew E. Haber

Published September 13th 2012
ISBN : 9781249364825
Paperback
126 pages
Enter the sum

 About the Book 

Computer network attack ushered in change for the profession of arms. Militaries achieve effects using computers, previously attained only through physical destruction. Computer network attacks problem is it operates outside the observable domainMoreComputer network attack ushered in change for the profession of arms. Militaries achieve effects using computers, previously attained only through physical destruction. Computer network attacks problem is it operates outside the observable domain the laws of armed conflict describe, yet its effects are what the laws address. Thus, the primary research question is: Does a legal framework of analysis exist for computer network attack? The secondary question became: If a framework exists, is it applied consistently throughout the Department of Defense? A search of literature and interviews with information operators and their associated lawyers revealed a framework by Thomas Wingfield. The framework analyzes the level of force but does not address the four basic principles for warfare- military necessity, humanity, proportionality, and discrimination. Also, the framework is not applied throughout the Department of Defense. The Joint Task Force Computer Network Operations creation is the first step in building a hierarchical structure for consistent application of law to computer network attack. Research recommends such a structure expand Wingfields framework for computer network attack to be a viable weapon for Twenty-First-Century Warfare.